CVE-2022-3512
- EPSS 0.02%
- Published 28.10.2022 10:15:17
- Last modified 21.11.2024 07:19:40
Using warp-cli command "add-trusted-ssid", a user was able to disconnect WARP client and bypass the "Lock WARP switch" feature resulting in Zero Trust policies not being enforced on an affected endpoint.
CVE-2022-3320
- EPSS 0.01%
- Published 28.10.2022 10:15:09
- Last modified 21.11.2024 07:19:17
It was possible to bypass policies configured for Zero Trust Secure Web Gateway by using warp-cli 'set-custom-endpoint' subcommand. Using this command with an unreachable endpoint caused the WARP Client to disconnect and allowed bypassing administrat...
CVE-2022-2225
- EPSS 0.05%
- Published 26.07.2022 12:15:08
- Last modified 21.11.2024 07:00:34
By using warp-cli subcommands (disable-ethernet, disable-wifi), it was possible for a user without admin privileges to bypass configured Zero Trust security policies (e.g. Secure Web Gateway policies) and features such as 'Lock WARP switch'.
CVE-2022-2145
- EPSS 0.09%
- Published 28.06.2022 18:15:08
- Last modified 21.11.2024 07:00:25
Cloudflare WARP client for Windows (up to v. 2022.5.309.0) allowed creation of mount points from its ProgramData folder. During installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.
CVE-2022-2147
- EPSS 0.1%
- Published 23.06.2022 21:15:07
- Last modified 21.11.2024 07:00:25
Cloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0.
CVE-2020-35152
- EPSS 0.05%
- Published 03.02.2021 00:15:14
- Last modified 21.11.2024 05:26:52
Cloudflare WARP for Windows allows privilege escalation due to an unquoted service path. A malicious user or process running with non-administrative privileges can become an administrator by abusing the unquoted service path issue. Since version 1.2....